After explaining why you’d want to use BGP-LS and PCEP in your network, Julian Lucek did a quick deep dive into the intricacies of BGP-LS, including printouts relating BGP-LS updates to IS-IS topology database.
This part of the PCEP/BGP-LS webinar is already public, to watch the rest of it fill in a short form on the webinar description page.
We're happy to announce that next week CloudFlare is hosting the Null Security meetup in Singapore. You are invited!
Null is a community for hackers and security enthusiasts. Monthly meetups are organized in a number of Asian cities. Read more at http://null.co.in/.
The lineup for the February meetup:
If you’d like to sign up for the event, you can do so here:
What: Null Singapore - The Open Security Community meetup
When: February 24th: 6:45pm-8:45pm
Where: The Working Capitol, "The Commons" Room, 1 Keong Saik Road, Singapore 089109
CloudFlare is actively hiring in Singapore!
The Arista train keeps rolling, albeit a little more slowly.
Third time's a charm?
You simply cannot miss this HyTrust webinar where the key elements for a secure & compliant data center will be presented. Sign up now!
New OpenG technology uses Citizens Broadband Radio Service in the 3.5 GHz spectrum.
In the past few years, as the SDN and NV market have evolved from PowerPoint concepts to working products, the market has matured into a multibillion-dollar business.
The pre-MWC rush encompasses 5G and cloud data centers.
Social media giant developed NetNORAD to quickly track down problems on its massive network.
This year’s RSA Conference ought to be good—and VMware is well represented among the industry’s security leaders and pioneers who will discuss topics from network virtualization to data center security to Minecraft. Continue reading
One of the biggest distributors of IT technology is now owned by a Chinese company. Supply chain integrity anyone ?
The post Response:Ingram Micro Sold. Supply Chain Integrity Question appeared first on EtherealMind.
Distributed Denial of Service (DDoS) attacks are often used to hold companies—particularly wealthy companies, like financial institutions—to ransom. Given the number of botnets in the world which can be purchased by the hour, and the relative ease with which new systems can be infected (especially given the rise of the Internet of Things), it’s important to find new and innovative ways to protect against such attacks. Dirt Jumper is a common DDoS platform based on the original Dirt, widely used to initiate such attacks. Probably the most effective protection against DDoS attacks, particularly if you can’t pin down the botnet and block it on a per-IP-address basis (try that one some time) is to construct a tar pit that will consume the attacker’s resources at a rate faster than your server’s are consumed.
The paper linked here describes one such tar pit, and even goes into detail around a defect in the Dirt Jumper platform, and how the defenders exploited the defect. This is not only instructive in terms of understanding and countering DDoS attacks, it’s also instructive from another angle. If you think software is going to eat the world, remember that even hacking software has defects that Continue reading